Study of mobile agent protection based on data obfuscation and time checking

被引:0
|
作者
Wu, Jiehong [1 ]
Chang, Guiran [2 ]
Gao, Fuxiang [3 ]
Yin, Hang [1 ,2 ]
机构
[1] Engineering Training Center, Shenyang Institute of Aeronautical Engineering, Shenyang 110136, China
[2] Computation Center, Northeastern University, Shenyang 110006, China
[3] College of Information Science and Engineering, Northeastern University, Shenyang 110006, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:363 / 369
相关论文
共 50 条
  • [21] A New Compile-time Obfuscation Scheme for Software Protection
    Zhang Yujia
    Pang Jianmin
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 1 - 5
  • [22] Mobile Agent Based Real Time IP Traceback
    Armoogum, Sandhya
    Mohamudally, Nawaz
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 71 - 76
  • [23] Protection of a mobile agent with a reference clone
    Benachenhou, L
    Pierre, S
    COMPUTER COMMUNICATIONS, 2006, 29 (02) : 268 - 278
  • [24] A Differentially Private Data Aggregation Method Based on Worker Partition and Location Obfuscation for Mobile Crowdsensing
    Li, Shuyu
    Zhang, Guozheng
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (01): : 223 - 241
  • [25] RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 405 - 410
  • [26] A new architecture for digital copyright protection system based on mobile agent
    Quan, Liu
    Hong, Liu
    ICIEA 2008: 3RD IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, PROCEEDINGS, VOLS 1-3, 2008, : 1976 - 1979
  • [27] Research on Code Obfuscation Based on Maze Protection Technology
    Wang, Zhiyue
    Wu, Weimin
    Ma, Wenrui
    Li, Jinliang
    Huang, Zhiwei
    MECHATRONICS, ROBOTICS AND AUTOMATION, PTS 1-3, 2013, 373-375 : 1691 - +
  • [28] Research of mobile agent active protection based on homomorphism encryption technology
    Wu, Jie-Hong
    Zhang, Lei
    Zhang, Po
    Shi, Xiang-Bin
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2013, 43 (SUPPL.1): : 221 - 224
  • [29] Study on Data Gathering Algorithm Based on Mobile Agent and WSN for Emergent Event Monitoring
    Yuan, Lingyun
    Wang, Xingchao
    2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 350 - +
  • [30] TAMAP: a new trust-based approach for mobile agent protection
    Hacini, Salima
    Guessoum, Zahia
    Boufaida, Zizette
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (04): : 267 - 283